List of Topics:
Location Research Breakthrough Possible @S-Logix pro@slogix.in

Office Address

Social List

Cellular Authentication for Mobile and Internet Services - Research Book

Cellular Authentication for Mobile and Internet Services - Research Book

Interesting Research Book in Cellular Authentication for Mobile and Internet Services

Author(s) Name:  Silke Holtmanns, Valtteri Niemi, Philip Ginzboorg, Pekka Laitinen, N. Asokan

About the Book:

   Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure web browsing with a phone or PC, Single Sign-On (SSO), mobile broadcast content protection, secure location services, etc. The book discusses the Generic Authentication Architecture (GAA) of the mobile standardization body 3rd Generation Partnership Project (3GPP) and its American counterpart 3GPP2 in full detail and with all variants. It explains the usage of GAA by various standardization bodies and standardized applications, and also looks at a number of non-standardized ones, such as secure remote login to enterprise environment and card personalization.
Cellular Authentication for Mobile and Internet Services:

  • Describes the usage of the generic authentication architecture (GAA) by various standardization bodies and standardized applications, covering mobile broadcast / multicast service security, Single Sign-On, HTTPS (i.e. secure web browsing), secure data access, secure location services, etc
  • Provides guidance on how to integrate the generic authentication into existing and future terminals, networks and applications
  • Explains the functionality of the application security in general as well as on application developer level
  • Describes various business scenarios and related security solutions, and covers secure application implementation and integration
  • Brings together essential information (currently scattered across different standardization bodies) on standards in one comprehensive volume

  • Table of Contents

  • 1. Introduction
  • 2. Classical Approaches to Authentication and Key Agreement
  • 3. Generic Authentication Architecture
  • 4. Applications Using Generic Authentication Architecture
  • 5. Guidance for Deploying GAA
  • 6. Future Trends
  • ISBN:  978-0-470-72317-3

    Publisher:  Wiley Telecom

    Year of Publication:  2008

    Book Link:  Home Page Url